ETECH 1st Grading Notes
ETECH 1st Grading Notes
TECHNOLOGY
Technology: machinery and equipment developed from the application of scientific knowledge
Information and Communications Technology (ICT) often deals with the use of different
technologies such as mobile phones, telephones, computers, the Internet, and other devices, as
well as software applications to locate, save, send, and manipulate information.
- 119 million mobile phone subscriptions from a total population of 101 million and 47
million active Facebook accounts
- fastest growing app market in Southeast Asia and the highest digital population in the
world
- top online activities are social media, videos, online mobile games, location-based
search, and online shopping
- ICT Department in the Philippines is responsible for the planning, development and
promotion of the country’s information and communications technology (ICT) agenda in
support of national development.
❖ Philippines is dubbed as the “ICT Hub of Asia” because of huge growth of ICT-related jobs,
one of which is BPO, Business Process Outsourcing, or call centers.
INTERNET
A global system of interconnected computer networks that uses the Internet protocol suite
(TCP/IP) to communicate between networks and devices.
WORLD WIDE WEB
It is also known as WWW or W3 introduce by Tim Berners-Lee. It consists of different pages that
are formatted in a markup language called HTML (Hypertext Markup Language) and linked to
each other that contain text, graphics, multimedia files, hyperlinks etc.
Sir Tim Berners-Lee: He invented the World Wide Web in 1989. He is a British computer
scientist.
The World Wide Web browser software, such as Microsoft's Internet Explorer/Edge, Mozilla
Firefox, Opera, Apple's Safari, and Google Chrome, lets users navigate from one web page to
another via the hyperlinks embedded in the documents.
• It is the first stage of the World Wide Web evolution. It is a flat or stationary page since it
cannot be manipulated by the user.
• It is a term coined to differentiate the first stage of the World Wide Web (www) in comparison
with the present stage of the internet technology.
• The users can now interact, contribute, and create their own internet space and content
(Explosion of Information & Social Media).
• It provides a framework that allows data to be shared and reused to deliver web content
specifically targeting the user.
• Search Engines will learn about you and your habits from each search you perform and will
gather details about you from your previous activities like likes and social postings and present
the answers as per your preferences.
• The context of the search of the user is processed by a programming language to help the
user by presenting options of what the person is interested in.
MOBILE MEDIA
A range of handheld devices, from mobile phones, tablets, and e-readers to game consoles, are
primarily used as personal, interactive, Internet-abled and user controlled portable platforms
that allow interconnected users to exchange personal and non-personal information (Wei,
2013).
ASSISTIVE MEDIA
A computer-mediated tools that allow large group of people to create, share or exchange
information, interest and the information shared can be in the form of ideas, pictures, videos or
anything that you want to create and share to virtual communities.
It makes it easier for users to interact, to collect, and use the data from the user’s interactions
for their own particular needs.
INTERNET
Online Safety
The importance of internet plays a crucial part in human development. Life becomes easy and
comfortable because of this technology. Most of us are connected to the internet via laptop,
mobile phone, tablet, personal computer and other electronic gadgets. Behind this technology
there is a risk that everyone should be aware of. You could be at risk on scam, bullying, and
illegal activities if you will not take precautions in using internet. We need to keep ourselves
safe and secure whenever we use the internet. That is why it is very important to know and
learn the ways on how to be safe and secured online.
INTERNET RISK
Cyberbullying
- It happens when someone intentionally abused, harass, and mistreated by other person
using electronic communication.
Identity Theft
- It is a crime of stealing personal information for the purpose of assuming that person’s
name or identity to make any form of transactions.
Cyber Stalking
Sexting
- The act of sending sexually explicit text messages, images, and videos.
INTERNET THREAT
Types of Malwares:
1. Computer Virus
2. Computer Worm
3. Trojan Horse
4. Spyware
5. Adware
6. Keylogger
7. Botnet
8. Rootkit
9. Ransomware
Computer Virus
• It is a program that duplicates/ replicates itself and then infects the computer.
Computer Worm
• It is a dangerous computer program that replicates itself through a network. Some worms
delete files, others disrupt the network function.
• It is usually spread through email and running of attachments from suspicious sources.
• A malware fronting to perform a good task, but covertly performs undesirable function with
the intention of entering the computer without the user’s consent.
• It can disable the computer’s defenses, opening it to unauthorized entry. It can erase data, can
corrupt files, allow access to computer.
• A malicious program that disguised as legitimate program that user will accept and use but
take control of your computer.
Spyware
• It has the ability to monitor what you are currently doing and typing through keylogging.
• A malicious program that gathers information from victim’s computer and send it back to the
hacker.
Adware
• An unwanted advertisement that will pop-up several times on victim’s computer then behave
abnormally and tedious to close them.
Keylogger
A program that runs in the background and steals user credentials and confidential information
and send back to hack by recording every keystroke that a user makes on their computer or
device.
Botnet
A collection of infected internet–connected devices such as PC and mobile phone that are
controlled by a common type of malware.
Rootkit
A software tools used by hackers to gain control over a computer on a network without being
exposed.
Ransomware
A ransom virus that block the user from accessing the programs or files and demands to pay
the ransom through online method for the removal of the virus.
EMAIL SPAM
• Usually, unsolicited commercial email sent from an unknown source with identical message
sent to multiple recipients.
• Dangerous ones can carry viruses and other malicious software (Malware)
PHISHING
• It is usually done through emails or using popular entity such as Microsoft, Yahoo, Google,
Amazon, and financial institutions.
EMAIL SPOOFING
• Usually, unsolicited commercial email sent from an unknown source with identical message
sent to multiple recipients.
• Dangerous ones can carry viruses and other malicious software (Malware)
PHARMING
• This is a dangerous hacker attack on a website which directs all traffic to that website to
another fictitious website.
• The main objective is to obtain username and passwords, as well as credit cards ad financial
information, and use these to steal their money electronically or use the credit cards of the
victims.
• This is a person who is able to enter and control other people’s computer without
authorization.
• Usually vandalizes the victims’ website, steals personal information, obtains intellectual
property, and performs credit card fraud.
Cybercrime
A crime in which computer is used as object and tool in committing a crime such hacking,
phishing, spamming, child pornography, libel, hate crimes, identity thief and others.
Cybercrime Law
It is a word that came from the two words “net” and “etiquette”. It is an etiquette applied online
that shows proper manner and behavior. If you are a member of an online society through
social media, you are called netizen. And in interacting with other netizen online, we need to
maintain good behavior which is acceptable to others in online community.
2. Adhere to the same standard behavior online that you would follow in real life
SEARCH ENGINES
Internet Research - It is a research method in collecting and gathering information via internet
by using search engine such as google.
Search Engine - A software system designed to search the internet for information by entering
keyword of phrase.
2 Directories:
META - Transmit user supplied keywords simultaneously to several individual search engines to
carry out the search.
Getting the correct and reliable information is our goal in internet research. We may rely
on the capability of search engine but sometimes it may not give us the correct information
because of the keywords we entered into a search engine. There are techniques in searching
information that can be applied in search engine in order to get a better result. Some search
engines allow combination of words and logic connectors of AND, OR, and NOT.
1. Use of Keyword
2. Use of Phrases
3. Capitalization
4. Boolean Logic
5. Wildcards and Truncation
Use of Keywords
• Avoid verbs and use modifiers only when they help to define your object most precisely
Use of Phrases
Capitalization
• When searching proper names, use capital or uppercase to narrow the search
Boolean Logic
Disadvantages
1. Online is not totally secure and theft is one of the numerous dangers it poses,
researchers personal information is at risk of being access by rogue persons.
2. Some of the materials on the internet have not been evaluated by experts or
thoroughly screened.
3. Lack of accreditation and low quality.
• Research design covers the key issues in developing a successful research project.
• Research methods takes you to resources on essential techniques for carrying out convincing
research.
• Working with data will provide resources on the use of statistics and other numerical skills in
research.
COPYRIGHT
Copyright Issues
- There are millions of information that we can get from the internet. Some of this
information are free but others are not. They are protected by a copyright law.
What is Copyright?
Copyright is a protection given to the owner of the rights in an original work such as books,
musical works, films, paintings, and other works, and computer programs. This original work is
called intellectual property which is protected under Republic Act 8293 known as the
“Intellectual Property Code of the Philippines”.
Copyright Infringement
This happens when the copyrighted work is use by other person without permission of the
author or copyright holder. Any person who is infringing the right protected work would be
liable under the law. An example of this is the case of M.Y. Intercontinental Trading Corporation
(MITC), Tedwin T. Uy, Allianz Marketing and Publishing Corp. (Allianz), and Fujian New
Technology Color Making and Printing Company, LTD (Fujian) against St.
Mary’s Publishing Corporation (SMPC). Manila regional trial court ordered Fujian and its
partners to pay P24.7 million for the damages and cost of litigation for copyright infringement
to SMPC. Fujian and its three local partners was guilty of printing, copying, reproducing,
importing, distributing and selling of original and revised textbooks that they have illegally sold
to Department of Education in Zamboanga, Municipality of Cabuyao in Laguna and Municipality
of Matnog in Sorsogon without the approval of SMPC, the copyright owner of the textbooks.
Fair Use
Research is important to the students and other people. Most of them rely on the information
that they can get online. Although this information is protected by a copyright law but we can
still use this information without permission in a limited way under certain condition and
purpose. Fair use is the use of copyrighted material for comment, teaching, criticism, news
reporting, research, scholarship, and other similar purpose is not an infringement of copyright.
Example of this is when you post a quote from a person in your Facebook wall. Include the
name of person who owns the quote in your post. Another example is when you copy image
from internet, give credit to the creator of image. The copied image should be use for
educational purpose not for commercial use. In fair use, 5% of the content of reference can
only be copied. If 20% or less of reference copied, there must be a secondary use agreement
and fee. And if 20% or more of reference copied, it requires purchasing of creative work.
Basic Formatting: